1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
9

Which of the following accurately describe the

Computers and Technology
2 answers:
tatyana61 [14]3 years ago
6 0

Answer:

A C D on edge

Explanation:

Ronch [10]3 years ago
3 0

Answer:

I can get a few months ago but the other use of the way you can you are you have a few weeks ago

You might be interested in
What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute f
cricket20 [7]

Explanation:

A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.

We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.

5 0
1 year ago
What's up with this new update?
Andre45 [30]

Answer:

so do i the notifications are out of control i try to ignore them

Explanation:

and yea so it seems you like to do things such as VR? if so i suggest one from the Oculus brand i dont use them but i heard they were good!

~Brianna/edgumacation

4 0
3 years ago
Read 2 more answers
What is a device that enables a spacecraft crew to exit from the spacecraft and launch tower in the event of a crisis before tak
algol [13]
i think its alternative escape strategy
6 0
3 years ago
The most fundamental components of storage that users interact with are the:
Levart [38]
<span>A file can contain the instructions of a computer program or the data that you care to store.

so the answer is =  file
</span>
8 0
3 years ago
Internet service providers​ (isp) need to resolve customer problems as quickly as possible. for one​ isp, past data indicates th
I am Lyosha [343]
I think that the likelihood will still be 0.8 as that means that 8 out of 10 calls will be resolved within one hour so the 7 out of 10 falls within that likelihood so therefore the callers can go by that assumption and be fairly confident that they have quite a high likelihood of having their problems resolved within one hour.
3 0
3 years ago
Read 2 more answers
Other questions:
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • For C programming language, what does it mean when you have an exclamation mark after an equal sign? ie:
    5·1 answer
  • An automated search feature used by search engines to find results that match your search terms is called a spider or _______. A
    15·2 answers
  • Converting denary no 41 to binar
    12·1 answer
  • How can you have a safe browsing experience?
    10·2 answers
  • What would be an ideal scenario for using edge computing solutions? a regional sales report uploaded to a central server once a
    14·1 answer
  • ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP​
    6·2 answers
  • Write a subclass called SavingsAccount that extends Account and adds an interest rate variable. Write a constructor with 3 argum
    6·1 answer
  • You can put ______ on your phone.
    10·1 answer
  • What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!